Skip to content

Commit 56bc27f

Browse files
committed
fix broken links, use attributes
Signed-off-by: Fabrice Flore-Thébault <[email protected]>
1 parent 6cbbed5 commit 56bc27f

16 files changed

+65
-64
lines changed

modules/authentication/proc-authenticationg-with-the-guest-user-on-a-helm-based-installation.adoc

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,11 @@
55
On a Helm-based installation, you can configure {product-short} to log in as a Guest user and access {product-short} features.
66

77
.Prerequisites
8-
* You link:https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}#Install%20and%20Upgrade[Installed {product-short} by using the Helm Chart].
8+
* You link:{configuring-book-url}[added a custom {product-short} application configuration], and have sufficient permissions to modify it.
9+
* You link:{configuring-book-url}#using-the-helm-chart-to-run-rhdh-with-your-custom-configuration[use the {product} Helm chart to run {product-short}].
910
1011
.Procedure
11-
* To enable the guest user in your {product-short} custom configuration, link:https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/administration_guide_for_red_hat_developer_hub/index#proc-add-custom-app-file-openshift-helm_admin-rhdh[configure your {product} Helm Chart] with following content:
12+
* To enable the guest user in your {product-short} custom configuration, link:{configuring-book-url}#using-the-helm-chart-to-run-rhdh-with-your-custom-configuration[configure your {product} Helm Chart] with following content:
1213
+
1314
.{product} Helm Chart configuration fragment
1415
[source,yaml]

modules/authentication/proc-authenticationg-with-the-guest-user-on-an-operator-based-installation.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ After an Operator-based installation, you can configure {product-short} to log i
99
* You link:{configuring-book-url}[added a custom {product-short} application configuration], and have sufficient permissions to modify it.
1010
1111
.Procedure
12-
* To enable the guest user in your {product-short} custom configuration, link:https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/administration_guide_for_red_hat_developer_hub/index#proc-add-custom-app-config-file-ocp-operator_admin-rhdh[edit your {product-short} application configuration] with following content:
12+
* To enable the guest user in your {product-short} custom configuration, link:{configuring-book-url}#provisioning-your-custom-configuration[edit your {product-short} application configuration] with following content:
1313
+
14-
.`app-config-rhdh.yaml` fragment
14+
.`{my-app-config-file}` fragment
1515
[source,yaml]
1616
----
1717
auth:

modules/authentication/proc-enabling-authentication-with-rhbk.adoc

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -36,10 +36,10 @@ Save the value for the next step:
3636
`AUTH_OIDC_CLIENT_SECRET`:: Enter the saved **Client Secret**.
3737
`AUTH_OIDC_METADATA_URL`:: Enter the saved **{rhbk} realm base URL**.
3838

39-
. To set up the {rhbk} authentication provider in your {product-short} custom configuration, edit your custom {product-short} ConfigMap such as `app-config-rhdh`, and add the following lines to the `app-config-rhdh.yaml` content:
39+
. To set up the {rhbk} authentication provider in your {product-short} custom configuration, edit your custom {product-short} ConfigMap such as `app-config-rhdh`, and add the following lines to the `{my-app-config-file}` content:
4040
+
4141
--
42-
.`app-config-rhdh.yaml` fragment with mandatory fields to enable authentication with {rhbk}
42+
.`{my-app-config-file}` fragment with mandatory fields to enable authentication with {rhbk}
4343
[source,yaml]
4444
----
4545
auth:
@@ -72,7 +72,7 @@ To enable authentication without requiring to provision users in the {product-sh
7272
+
7373
WARNING: Use this option to explore {product-short} features, but do not use it in production.
7474
+
75-
.`app-config-rhdh.yaml` fragment with optional field to allow authenticating users absent from the software catalog
75+
.`{my-app-config-file}` fragment with optional field to allow authenticating users absent from the software catalog
7676
[source,yaml]
7777
----
7878
auth:
@@ -92,7 +92,7 @@ dangerouslyAllowSignInWithoutUserInCatalog: true
9292
--
9393
{rhbk} callback URL.
9494

95-
.`app-config-rhdh.yaml` fragment with optional `callbackURL` field
95+
.`{my-app-config-file}` fragment with optional `callbackURL` field
9696
[source,yaml]
9797
----
9898
auth:
@@ -107,7 +107,7 @@ auth:
107107
--
108108
Token endpoint authentication method.
109109

110-
.`app-config-rhdh.yaml` fragment with optional `tokenEndpointAuthMethod` field
110+
.`{my-app-config-file}` fragment with optional `tokenEndpointAuthMethod` field
111111
[source,yaml]
112112
----
113113
auth:
@@ -122,7 +122,7 @@ auth:
122122
--
123123
Token signed response algorithm.
124124

125-
.`app-config-rhdh.yaml` fragment with optional `tokenSignedResponseAlg` field
125+
.`{my-app-config-file}` fragment with optional `tokenSignedResponseAlg` field
126126
[source,yaml]
127127
----
128128
auth:
@@ -137,7 +137,7 @@ auth:
137137
--
138138
{rhbk} scope.
139139

140-
.`app-config-rhdh.yaml` fragment with optional `scope` field
140+
.`{my-app-config-file}` fragment with optional `scope` field
141141
[source,yaml]
142142
----
143143
auth:
@@ -153,7 +153,7 @@ auth:
153153
Declarative resolvers to override the default resolver: `emailLocalPartMatchingUserEntityName`.
154154
The authentication provider tries each sign-in resolver until it succeeds, and fails if none succeed.
155155

156-
.`app-config-rhdh.yaml` fragment with optional `callbackURL` field
156+
.`{my-app-config-file}` fragment with optional `callbackURL` field
157157
[source,yaml]
158158
----
159159
auth:
@@ -172,7 +172,7 @@ auth:
172172
--
173173
To modify the {product-short} token expiration from its default value of one hour, note that this refers to the validity of short-term cryptographic tokens, not the session duration. The expiration value must be set between 10 minutes and 24 hours.
174174

175-
.`app-config-rhdh.yaml` fragment with optional `auth.backstageTokenExpiration` field
175+
.`{my-app-config-file}` fragment with optional `auth.backstageTokenExpiration` field
176176
[source,yaml,subs="+quotes"]
177177
----
178178
auth:

modules/authentication/proc-provisioning-users-from-github-to-the-software-catalog.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,11 +11,11 @@ Consider configuring {product-short} to provision users from GitHub to the softw
1111

1212
.Procedure
1313

14-
* To enable GitHub member discovery, edit your custom {product-short} ConfigMap, such as `app-config-rhdh`, and add the following lines to the `app-config-rhdh.yaml` content:
14+
* To enable GitHub member discovery, edit your custom {product-short} ConfigMap, such as `app-config-rhdh`, and add the following lines to the `{my-app-config-file}` content:
1515
+
1616
--
1717
[id=githubProviderId]
18-
.`app-config.yaml` fragment with mandatory `github` fields
18+
.`{my-app-config-file}` fragment with mandatory `github` fields
1919
[source,yaml]
2020
----
2121
dangerouslyAllowSignInWithoutUserInCatalog: false

modules/authentication/proc-provisioning-users-from-microsoft-azure-to-the-software-catalog.adoc

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -7,11 +7,11 @@ To authenticate users with Microsoft Azure, after xref:enabling-authentication-w
77
* You have xref:enabling-authentication-with-microsoft-azure[enabled authentication with Microsoft Azure].
88

99
.Procedure
10-
* To enable Microsoft Azure member discovery, edit your custom {product-short} ConfigMap, such as `app-config-rhdh`, and add following lines to the `app-config-rhdh.yaml` content:
10+
* To enable Microsoft Azure member discovery, edit your custom {product-short} ConfigMap, such as `app-config-rhdh`, and add following lines to the `{my-app-config-file}` content:
1111
+
1212
--
1313
[id=microsoftGraphOrgProviderId]
14-
.`app-config.yaml` fragment with mandatory `microsoftGraphOrg` fields
14+
.`{my-app-config-file}` fragment with mandatory `microsoftGraphOrg` fields
1515
[source,yaml]
1616
----
1717
dangerouslyAllowSignInWithoutUserInCatalog: false
@@ -43,7 +43,7 @@ Defines the authority used.
4343
Change the value to use a different link:https://learn.microsoft.com/en-us/graph/deployments#app-registration-and-token-service-root-endpoints[authority], such as Azure US government.
4444
Default value: `https://login.microsoftonline.com`.
4545
+
46-
.`app-config.yaml` fragment with optional `queryMode` field
46+
.`{my-app-config-file}` fragment with optional `queryMode` field
4747
[source,yaml]
4848
----
4949
catalog:
@@ -57,7 +57,7 @@ catalog:
5757
Certain features require `advanced` querying capabilities.
5858
See link:https://docs.microsoft.com/en-us/graph/aad-advanced-queries[Microsoft Azure Advanced queries].
5959
+
60-
.`app-config.yaml` fragment with optional `queryMode` field
60+
.`{my-app-config-file}` fragment with optional `queryMode` field
6161
[source,yaml]
6262
----
6363
catalog:
@@ -74,7 +74,7 @@ Only one relationship can be expanded in a single request.
7474
See https://docs.microsoft.com/en-us/graph/query-parameters#expand-parameter[Microsoft Graph query expand parameter].
7575
This parameter can be combined with xref:userGroupMemberFilter[] or xref:userFilter[].
7676
+
77-
.`app-config.yaml` fragment with optional `user.expand` field
77+
.`{my-app-config-file}` fragment with optional `user.expand` field
7878
[source,yaml]
7979
----
8080
catalog:
@@ -91,7 +91,7 @@ To filter users.
9191
See link:https://docs.microsoft.com/en-us/graph/api/resources/user?view=graph-rest-1.0#properties[Microsoft Graph API] and link:https://docs.microsoft.com/en-us/graph/query-parameters#filter-parameter[Microsoft Graph API query filter parameters syntax].
9292
This parameter and xref:userGroupMemberFilter[] are mutually exclusive, only one can be specified.
9393
+
94-
.`app-config.yaml` fragment with optional `user.filter` field
94+
.`{my-app-config-file}` fragment with optional `user.filter` field
9595
[source,yaml]
9696
----
9797
catalog:
@@ -107,7 +107,7 @@ catalog:
107107
Load photos by default.
108108
Set to `false` to not load user photos.
109109
+
110-
.`app-config.yaml` fragment with optional `user.loadPhotos` field
110+
.`{my-app-config-file}` fragment with optional `user.loadPhotos` field
111111
[source,yaml]
112112
----
113113
catalog:
@@ -122,7 +122,7 @@ catalog:
122122
`user.select`::
123123
Define the link:https://docs.microsoft.com/en-us/graph/api/resources/schemaextension?view=graph-rest-1.0[Microsoft Graph resource types] to retrieve.
124124
+
125-
.`app-config.yaml` fragment with optional `user.select` field
125+
.`{my-app-config-file}` fragment with optional `user.select` field
126126
[source,yaml]
127127
----
128128
catalog:
@@ -139,7 +139,7 @@ To use group membership to get users.
139139
To filter groups and fetch their members.
140140
This parameter and xref:userFilter[] are mutually exclusive, only one can be specified.
141141
+
142-
.`app-config.yaml` fragment with optional `userGroupMember.filter` field
142+
.`{my-app-config-file}` fragment with optional `userGroupMember.filter` field
143143
[source,yaml]
144144
----
145145
catalog:
@@ -156,7 +156,7 @@ To use group membership to get users.
156156
To search for groups and fetch their members.
157157
This parameter and xref:userFilter[] are mutually exclusive, only one can be specified.
158158
+
159-
.`app-config.yaml` fragment with optional `userGroupMember.search` field
159+
.`{my-app-config-file}` fragment with optional `userGroupMember.search` field
160160
[source,yaml]
161161
----
162162
catalog:
@@ -174,7 +174,7 @@ Only one relationship can be expanded in a single request.
174174
See https://docs.microsoft.com/en-us/graph/query-parameters#expand-parameter
175175
This parameter can be combined with xref:userGroupMemberFilter[] instead of xref:userFilter[].
176176
+
177-
.`app-config.yaml` fragment with optional `group.expand` field
177+
.`{my-app-config-file}` fragment with optional `group.expand` field
178178
[source,yaml]
179179
----
180180
catalog:
@@ -190,7 +190,7 @@ catalog:
190190
To filter groups.
191191
See link:https://docs.microsoft.com/en-us/graph/api/resources/group?view=graph-rest-1.0#properties[Microsoft Graph API query group syntax].
192192
+
193-
.`app-config.yaml` fragment with optional `group.filter` field
193+
.`{my-app-config-file}` fragment with optional `group.filter` field
194194
[source,yaml]
195195
----
196196
catalog:
@@ -206,7 +206,7 @@ catalog:
206206
To search for groups.
207207
See link:https://docs.microsoft.com/en-us/graph/search-query-parameter[Microsoft Graph API query search parameter].
208208
+
209-
.`app-config.yaml` fragment with optional `group.search` field
209+
.`{my-app-config-file}` fragment with optional `group.search` field
210210
[source,yaml]
211211
----
212212
catalog:
@@ -221,7 +221,7 @@ catalog:
221221
`group.select`::
222222
To define the link:https://docs.microsoft.com/en-us/graph/api/resources/schemaextension?view=graph-rest-1.0[Microsoft Graph resource types] to retrieve.
223223
+
224-
.`app-config.yaml` fragment with optional `group.select` field
224+
.`{my-app-config-file}` fragment with optional `group.select` field
225225
[source,yaml]
226226
----
227227
catalog:
@@ -236,7 +236,7 @@ catalog:
236236
To specify custom schedule frequency.
237237
Supports cron, ISO duration, and "human duration" as used in code.
238238
+
239-
.`app-config.yaml` fragment with optional `schedule.frequency` field
239+
.`{my-app-config-file}` fragment with optional `schedule.frequency` field
240240
[source,yaml]
241241
----
242242
catalog:
@@ -251,7 +251,7 @@ catalog:
251251
To specify custom timeout.
252252
Supports ISO duration and "human duration" as used in code.
253253
+
254-
.`app-config.yaml` fragment with optional `schedule.timeout` field
254+
.`{my-app-config-file}` fragment with optional `schedule.timeout` field
255255
[source,yaml]
256256
----
257257
catalog:
@@ -266,7 +266,7 @@ catalog:
266266
To specify custom initial delay.
267267
Supports ISO duration and "human duration" as used in code.
268268
+
269-
.`app-config.yaml` fragment with optional `schedule.initialDelay` field
269+
.`{my-app-config-file}` fragment with optional `schedule.initialDelay` field
270270
[source,yaml]
271271
----
272272
catalog:

modules/authentication/proc-provisioning-users-from-rhbk-to-the-software-catalog.adoc

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,11 @@
66

77
.Procedure
88

9-
* To enable {rhbk} member discovery, edit your custom {product-short} ConfigMap, such as `app-config-rhdh`, and add the following lines to the `app-config-rhdh.yaml` content:
9+
* To enable {rhbk} member discovery, edit your custom {product-short} ConfigMap, such as `app-config-rhdh`, and add the following lines to the `{my-app-config-file}` content:
1010
+
1111
--
1212
[id=keycloakOrgProviderId]
13-
.`app-config.yaml` fragment with mandatory `keycloakOrg` fields
13+
.`{my-app-config-file}` fragment with mandatory `keycloakOrg` fields
1414
[source,yaml]
1515
----
1616
dangerouslyAllowSignInWithoutUserInCatalog: false
@@ -41,7 +41,7 @@ Optional: Consider adding the following optional fields:
4141
Realm to synchronize.
4242
Default value: `master`.
4343
+
44-
.`app-config.yaml` fragment with optional `realm` field
44+
.`{my-app-config-file}` fragment with optional `realm` field
4545
[source,yaml]
4646
----
4747
catalog:
@@ -55,7 +55,7 @@ catalog:
5555
Realm used to authenticate.
5656
Default value: `master`.
5757
+
58-
.`app-config.yaml` fragment with optional `loginRealm` field
58+
.`{my-app-config-file}` fragment with optional `loginRealm` field
5959
[source,yaml]
6060
----
6161
catalog:
@@ -69,7 +69,7 @@ catalog:
6969
User number to query simultaneously.
7070
Default value: `100`.
7171
+
72-
.`app-config.yaml` fragment with optional `userQuerySize` field
72+
.`{my-app-config-file}` fragment with optional `userQuerySize` field
7373
[source,yaml]
7474
----
7575
catalog:
@@ -83,7 +83,7 @@ catalog:
8383
Group number to query simultaneously.
8484
Default value: `100`.
8585
+
86-
.`app-config.yaml` fragment with optional `groupQuerySize` field
86+
.`{my-app-config-file}` fragment with optional `groupQuerySize` field
8787
[source,yaml]
8888
----
8989
catalog:
@@ -97,7 +97,7 @@ catalog:
9797
To specify custom schedule frequency.
9898
Supports cron, ISO duration, and "human duration" as used in code.
9999
+
100-
.`app-config.yaml` fragment with optional `schedule.frequency` field
100+
.`{my-app-config-file}` fragment with optional `schedule.frequency` field
101101
[source,yaml]
102102
----
103103
catalog:
@@ -112,7 +112,7 @@ catalog:
112112
To specify custom timeout.
113113
Supports ISO duration and "human duration" as used in code.
114114
+
115-
.`app-config.yaml` fragment with optional `schedule.timeout` field
115+
.`{my-app-config-file}` fragment with optional `schedule.timeout` field
116116
[source,yaml]
117117
----
118118
catalog:
@@ -127,7 +127,7 @@ catalog:
127127
To specify custom initial delay.
128128
Supports ISO duration and "human duration" as used in code.
129129
+
130-
.`app-config.yaml` fragment with optional `schedule.initialDelay` field
130+
.`{my-app-config-file}` fragment with optional `schedule.initialDelay` field
131131
[source,yaml]
132132
----
133133
catalog:

modules/authorization/proc-defining-authorizations-in-external-files-by-using-helm.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ configMap::
9191
defaultMode::: `420`
9292
name::: `rbac-policies`
9393

94-
. Update your {product-short} `app-config.yaml` configuration file to use the `rbac-policies.csv` and `rbac-conditional-policies.yaml` external files:
94+
. Update your {product-short} `{my-app-config-file}` configuration file to use the `rbac-policies.csv` and `rbac-conditional-policies.yaml` external files:
9595
+
9696
.`app-config.yml` fragment
9797
[source,yaml]

modules/authorization/proc-determining-permission-policy-and-role-configuration-source.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ You can only use this source to change the resource.
88
The available sources are:
99

1010
Configuration file::
11-
Configure roles and policies in the {product-short} `app-config.yaml` configuration file, for instance to xref:enabling-and-giving-access-to-rbac[declare your policy administrators].
11+
Configure roles and policies in the {product-short} `{my-app-config-file}` configuration file, for instance to xref:enabling-and-giving-access-to-rbac[declare your policy administrators].
1212
+
1313
The Configuration file pertains to the default `role:default/rbac_admin` role provided by the RBAC plugin.
1414
The default role has limited permissions to create, read, update, delete permission policies or roles, and to read catalog entities.

modules/authorization/proc-enabling-the-rbac-plugin.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,9 @@ See link:{installing-and-viewing-dynamic-plugins-url}[{installing-and-viewing-dy
2727
. Declare policy administrators to enable a select number of authenticated users to configure RBAC policies through the REST API or Web UI, instead of modifying the CSV file directly.
2828
The permissions can be specified in a separate CSV file referenced in the `app-config-rhdh` ConfigMap, or permissions can be created using the REST API or Web UI.
2929
+
30-
To declare users such as _<your_policy_administrator_name>_ as policy administrators, edit your custom {product-short} ConfigMap, such as `app-config-rhdh`, and add following code to the `app-config-rhdh.yaml` content:
30+
To declare users such as _<your_policy_administrator_name>_ as policy administrators, edit your custom {product-short} ConfigMap, such as `app-config-rhdh`, and add following code to the `{my-app-config-file}` content:
3131
+
32-
.`app-config.yaml` fragment
32+
.`{my-app-config-file}` fragment
3333
[source,yaml,subs=+quotes]
3434
----
3535
permission:

modules/customizing-the-home-page/proc-customizing-the-home-page-cards.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ dynamicPlugins:
5151
----
5252

5353
.Prerequisites
54-
* You have administrative access and can modify the `app-config.yaml` file for dynamic plugin configurations.
54+
* You have administrative access and can modify the `{my-app-config-file}` file for dynamic plugin configurations.
5555

5656
.Procedure
5757
* Configure different cards for your Home page in {product} as follows:

0 commit comments

Comments
 (0)